版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
Followuson:
Twitter,
Instagram,
Facebook,
LinkedIn,
YouTube
Subscribetoourblog:
/blog
TableofContents
Introduction
1
HackersAren’tOnlyTargetingSMBs…
14
KeyFindings
2
AlmostHalfOfMSPsPartnerWithMSSPs
15
COVID-19andSecurity
3
WindowsEndpointSystemsApplications
16
MostTargetedbyHackers
AVarietyofMalwareTargetingSMBs
4
RansomwareCreepsIntoSaaSApps
17
RansomwareStillaMajorChallengeforMSPs
5
MostCommonRansomwareRecoveryMethods
18
RansomwareAwareness
7
BCDRClientsAreLessLikelytoExperience
20
RansomwareContinuestoSkirtCybersecurity
8
SignificantDowntime
Efforts
FinalTakeaways
22
SMBsKeepTakingTheBait
9
AdditionalResources
23
TheAftermathofAttacks
10
AbouttheReport
24
DowntimeFarMoreCostlyThanRansom
11
StillLocking(AfterAllTheseYears)
12
IndustriesMostSusceptibletoRansomware
13
Datto’sGlobalStateoftheChannelRansomwareReport ii
Introduction
Datto’sAnnualGlobalStateoftheChannelRansomwareReportcomprisesstatisticspulledfromasurveyofmorethan1,000managedserviceproviders(MSPs)aroundtheworld.Thereportprovidesuniquevisibilityintothestateofransomwarefromtheperspectiveofthe
ITchannelandtheirsmallandmediumbusiness(SMB)clientswhoaredealingwiththeseinfectionsonadailybasis.Thereportprovidesawealthofdetailonransomware,includingyear-over-yeartrends,frequency,targets,impact,andrecommendationsforensuringrecoveryandcontinuityinthefaceofthisgrowingthreat.
Withrespecttothecurrentclimate,thereportalsocoverstheimpactthatCOVID-19andtheincreaseinremoteworkandcloudcomputinghashadonransomwaretrends.
Thegoalofthisreportistohelpshedlightonthecurrentcybersecuritylandscapebusinessesarefacing.AtDatto,webelievethereisnolimittowhatsmallandmediumbusinessescanachievewiththerighttechnology.WehopethattheinformationcompiledhereenablesMSPstoeducatetheirclientsandworkwiththemtomitigatetheriskransomwareposesonbusinesses.
Datto’sGlobalStateoftheChannelRansomwareReport 1
KeyFindings
1Ransomwareisstillthenumberonemalwarethreat.Nearly70%ofMSPsreportransomwareasthemostcommonmalwarethreattoSMBs.
2COVID-19hashadanimpactonsecurity—butnotasmuchasyoumightthink.MSPsweresplitonthesecurityimpactoftheglobalpandemic.
3TheransomwaredisconnectbetweenMSPsandSMBsremains.84%ofMSPsare‘veryconcerned’aboutransomware,
butonly30%reportthattheirclientsfeelthesame.
4SMBsaren’ttheonlybusinessesbeingtargeted.95%ofMSPsagreethattheirownbusinessesareincreasinglybeingtargetedwithattacks.
5Phishingemailstopthesuccessfulattackvectorlist.Lackofcybersecurityeducation,weakpasswords,andpooruserpracticesareamongtheothertopcausesofransomware.
6
7
8
9
10
Theaftermathofanattackisnothingnice.62%ofMSPssaidclients’productivitywasimpactedduetoattacks,and39%saidtheirclientsexperiencedbusiness-threateningdowntime.
Theaverageransomrequestedbyhackersstayedroughlythesameyear-over-year.MSPsreporttheaveragerequestedransomforSMBsis$5,600perincident,comparedto$5,900lastyear.
MSPsreportthattheaveragecostofdowntimeis94%greaterthanitwasin2019.Downtimecostsarenearly50Xgreaterthantheransomrequestedin2020.
91%ofMSPsreportthatclientswithBCDRsolutionsin
placearelesslikelytoexperiencesignificantdowntimeduringaransomwareattack.
92%ofMSPspredictransomwareattackswillcontinueat
current,orworse,rates.
Datto’sGlobalStateoftheChannelRansomwareReport 2
COVID-19andSecurity
AMixedBag
ManyMSPsreportedthatthenumberofransomwareattacksandsecurityvulnerabilitiesincreasedduringCOVID-19duetoanincreaseinremoteworkandcloudcomputing.However,itisworthpointingoutthatitwasn’tanoverwhelmingincrease—moreofanevensplitbetweenthosewhosawanincreaseandthosewhodidnot.
“[Personaldevices]havebeenintroducedtocorporate/businessenvironmentsdespiteobjectionsre:securitypolicies/endpointprotection,etc.Additionally,therearesignificantadditionalremoteworksecuritythreats,fromdevicethefttofamilymembersusingcorporatemachinesforpersonalwork/study,”saidanother.
59%
ofMSPssaidremoteworkduetoCOVID-19resultedinincreasedransomwareattacks.
52%
ofMSPsreportedthatshiftingclientworkloadstothecloudcamewithincreasedsecurityvulnerabilities.
MSPsreporthealthcareasthemostvulnerableindustryduringthepandemic(59%),followedbyfinance/insurance(50%),andgovernment(45%).
NorthAmerica Europe AsiaPacific
IncreasedriskcanbeattributedtousercarelessnessandsecurityvulnerabilitiesassociatedwithBYOD,accordingtorespondents.“Theriskcomesfromusersloweringtheirguardastherearesomanyotherthingsthathavechanged—healthrisks,workingfromhome,etc,”saidoneMSP.
55% 42% 47%
NorthAmericanMSPsaresomewhatmoreconcernedaboutcloudsecuritythantheirEuropeanandAsiaPacificcounterparts.
GEOTRENDS
Datto’sGlobalStateoftheChannelRansomwareReport 3
VarietyofMalwareTargetingSMBs
AmongthemalwarethreatsimpactingSMBs,ransomwareisstillatthetopoftheheap.However,it’sfarfromtheonlythreatontheirplate.Viruses,adware,spyware,andremoteaccesstrojansroundedoutthetopfive.
Cryptojacking,hotlastyear,cooledconsiderably,dropping15percentagepoints.Thistrackswithmainstreamreportsthat
cryptojackingisin
decline
ashackershavegrownimpatientwithslowreturnsoncoinmining.
Inthelasttwoyears,MSPsreportthefollowingtypesofmalwarehaveaffectedclients:
44%
Spyware
13%
Rootkits
15% 11%
Worms Exploitkits
56%
Viruses
68%
Ransomware
16%
Cryptojacking
53%
Adware
19%
Remoteaccess
trojans
11%
Keyloggers
*Surveyrespondentswereabletoselectmultipleanswerchoices.
Datto’sGlobalStateoftheChannelRansomwareReport 4
RansomwareStilla
MajorChallengeforMSPs
RansomwarecontinuestoplagueMSPsandtheSMBstheyserve.However,respondentsreportedaslightdeclineinthefrequencyofattacks.78%ofMSPsreportedattacksontheirclientsinthepasttwoyears,downfrom85%lastyear.Thatbeingsaid,ransomwareis
stillaveryrealthreatwith60%ofMSPsseeingattacksinthefirsthalfof2020.
ItisworthnotingthatthegeneraldisruptionofCOVID-19andresultingeconomicdownturnmayhaveimpactedthefrequencyofattacksontheSMBsthatMSPsserve.Thisispurelyspeculative,andoutsideoftheresearchconductedforthisreport.However,itwillbeinterestingtoseewhetherMSPsreportanuptickinransomwareattacksastheglobaleconomycontinuestorecover.
MSPsbelievethatwillbethecase.Nearlyallrespondentssaidtheyexpectransomwareattackswillriseintheupcomingyear.
78% 92%
ofMSPsreportattacksagainst ofMSPspredictattacks
SMBsinthelasttwoyears willincreaseinthenextyear
60% 11%
ofMSPsreportattacksagainst ofMSPsreportthatclients
SMBsin2020alone sufferedmultipleattacksin
asingleday
NorthAmerica Europe AsiaPacific
77% 85% 79%
EuropeanMSPsreportthattheirclientssufferedmoreattacksthananyotherregion.
GEOTRENDS
Datto’sGlobalStateoftheChannelRansomwareReport 5
Ransomwareisnotgoingaway,butattackersmayhaveshiftedtheirfocustemporarilytootherrevenuestreamsduringCOVID-19.Ifyouthinkofransomwarelikea‘business’thatneedstorespondtochangingmarketconditions,itmakessenseforthoseattackerstofocusonmorestablesourcesofrevenue,likelargerenterprises,duringaneconomicdownturn.Enterprisesbothrepresentalarger‘returnoninvestment’tohackersandaremoreresilienttofluctuationsintheeconomy.Ransomwareisanumbersgame,andlargercompaniessimplyrepresentabettertargetintougheconomictimes.
RyanWeeks
ChiefInformationSecurityOfficer,Datto,Inc.
Datto’sGlobalStateoftheChannelRansomwareReport 6
RansomwareAwareness
SMBsvs.MSPs
ThereisstilladisconnectbetweenSMBsandMSPswhenitcomestoperceptionsaboutransomware.ThemajorityofMSPsbelievebusinessesshouldbe“veryconcerned”aboutthethreatofransomware,butonly30%reporttheirclientsfeelthisway.However,itappearsthatSMBsarebeginningtounderstandhowdamagingransomwareattackscanbe.32%ofMSPsreportclientsare“moderatelyconcerned”and34%sayclientsare“somewhatconcerned”.
30% 84%
ofMSPsreportSMBsare ofMSPsreportSMBsshouldbe
“veryconcerned”about “veryconcerned”about
ransomware ransomware
SMBSecurityBudgetsontheRise
50%
ofMSPssaidtheirclientsincreased
budgetforITsecurityin2020.
Inadditiontothegrowingawarenessabove,increasedITsecurityspendingshowsthatSMBsarebeginningtotakeransomware,andsecurityingeneral,seriously.Theslightdeclineinransomwareattacksthisyearmightalsoindicatethatthesesecurityeffortsarehavingapositiveimpact.
NorthAmerica Europe AsiaPacific
31% 19% 33%
ComparedtotheirNorthAmericanandAsiaPacificcounterparts,fewerEuropeanMSPssaidtheirclientsfeel“veryconcerned”aboutransomwareattacks.
GEOTRENDS
Datto’sGlobalStateoftheChannelRansomwareReport 7
RansomwareContinuestoSkirtCybersecurityEfforts
Despiteincreasedsecurityspending,MSPsreportthatransomwareavertedcybersecurityeffortsincludingemployeeeducation,antivirus,emailfiltering,pop-upblockers,andendpointdetectionsolutions.Ofthem,50%saidransomwareavertedantivirus/anti-malwaresolutions.
Whenaskedaboutwhichantivirus/anti-malwaresolutionsspecifically,
MSPssaid:
59% 24%
Anti-malwarefiltering(email-, Endpointdetection
network-,andweb-based) andresponse
42% 12%
Legacysignature-based NextGenanti-virus
antivirus
Ransomwareisabletogetaroundthesesolutionsbecausethecybercriminalsfrequentlymodifytheirmalwaretoavoiddetection.What’sworse,thesocialengineeringtacticscriminalsusetodupevictimshavebecomeverysophisticatedandhardtodetect—evenwithsecurityeducation(moreonthatbelow).
That’swhyamultilayeredapproachtoransomwarethatincludesbusinesscontinuityissoimportant.Securitysoftwareandtrainingareessentialtopreventattacksbeforetheyhappen.Businesscontinuityenablesorganizationstoresumenormaloperationsquicklyifsecuritymeasuresfail.
Datto’sGlobalStateoftheChannelRansomwareReport 8
SMBsKeepTakingtheBait
Asnotedabove,endusereducationisanessentialpieceofaneffectiveransomwareprotectionstrategy.Thisyear’ssurveyresultsbearthatout:phishing,pooruserpractices,andlackofendusercybersecuritytrainingwerethethreemostcommoncausesofsuccessfulransomwarebreaches.
So,itisimportanttonotethatsecuritytrainingmustgobeyondjusthowtoidentifyphishingattacks.Whilephishingtoppedthelist,weakpasswords,openRDPaccess,andahostofotherusererrorswerealsotoblameforbreaches.
D
9CybersecurityTipsfor
EA
MSPstoBringtotheirClients
R
LeadingcausesofransomwareattacksreportedbyMSPs:
Phishingemails
60
54%
Pooruserpractices/gullibility
27%
Lackofcybersecuritytraining
26%
Weakpasswords/accessmanagement
21%
OpenRDPaccess
20%
Clickbait
17%
Maliciouswebsites
14%
Lost/stolenusercredentials
10%
LackoffundingforITsecuritysolutions
8%
Lackofexecutivebuy-inforadoptingsecuritysolutions
8%
*Surveyrespondentswereaskedtoselectthreeanswerchoices.
Datto’sGlobalStateoftheChannelRansomwareReport 9
TheAftermathofAttacks
Ransomwareattackscanresultinconsiderablebusinessdowntime,becausebreachesarerarelylimitedtoasinglecomputer.Mostoftheransomwareinusetodayisdesignedtocrawlbusinessnetworks,lookingforadditionalmachinestoinfect.Ifthemalwaregoesundetected,itdoesn’ttakelongfornumeroususerdevices,servers,andevendatainSaaSapplicationstobecomeencrypted.Restorescanbetimeconsuming,especiallyusingtraditionalbackuptools.
So,itmakessensethatlossofbusinessproductivityandbusiness-threateningdowntimewereatthetopofthelistofransomwareresults.Italsoexplainswhynearly20%ofMSPsreportedthatSMBswereforcedtopayaransominordertoreturntonormalbusiness.AllofthishighlightstheneedforabusinesscontinuitysolutionthatenablesSMBstoreturntoworkfast.
ConsequencesresultingfromransomwareattacksreportedbyMSPs:
Lossofbusiness
productivity
70
Stolendata
70
62%
13%
Business-threatening
Hackersthreatenedtopublicize
downtime
dataifransomwentunpaid
39%
10%
Ransomwareremained
Lostdataand/ordevice
onsystem,struckagain!
28%
6%
Decreased
Failuretomeet
customerprofitability
SLArequirements
24%
6%
Clientspaidransom
Failuretoachieve
andrecovereddata
regulatorycompliance
19%
4%
Paidaransombut
Damagedreputation
datawasneverreleased
17%
4%
*Surveyrespondentswereaskedtoselectthreeanswerchoices.
Datto’sGlobalStateoftheChannelRansomwareReport 10
DowntimeFarMore
CostlythanRansom
Whenitcomestoransomwareattacks,MSPsreportthecostofdowntimeisnearly50Xgreaterthantheransomrequested.
GEOTRENDS
AverageRansomin...
2018 2019 2020
$4,300 $5,900 $5,600
MSPsreporttheaveragecostofransomstayedroughlythesamein2020asitwasin2019.Sowhiletherehasbeenaslightdeclineinthefrequencyofattacks,hackersarestilldemandingahighransompayment.Wesawabiguptickinaverageransomfrom2018to2019,whenthedemandsincreasedby37%.
2020:Ransomvs.DowntimeCosts
Region
Ransom
Downtime
NorthAmerica
$6,200
$308,900
Europe
$3,500
$185,800
AsiaPacific
$4,400
$257,000
AverageCostofDowntimein...
2018
2019
2020
$46,800
$141,000
$274,200
MSPsreportedthattheaveragedowntimecostperincidenthasincreasedby94%from2019andastaggering486%from2018.
So,whatdoesthismeanexactly?Well,onfacevalueitmeansthatdowntimecostsarehigherthanreportedtwoyearsago,obviously.Thismaymeanthatdowntimecostshaveincreased,oritcouldmeanthatMSPsaregettingbetteratcalculatingtherealcostsofdowntime.Eitherway,it’sclearthatMSPsunderstandthatthedamageassociatedwithbusinessdowntimeisfarmorecostlythantheactualransom.
DowntimecostsvarywidelyamongbusinessesandthesenumbersarebasedonMSPestimates.Tocalculatethecostofpotentialdowntimeforyourbusiness,checkoutour
RecoveryTimeand
DowntimeCostCalculator
.
*AllsurveyrespondentsansweredinU.S.dollars.
Datto’sGlobalStateoftheChannelRansomwareReport 11
StillLocking
(AfterAll
TheseYears)
Forthe5thconsecutiveyearinarow,MSPsreportedCryptoLockerasthetopransomwarevariantimpactingtheirclients(52%).WannaCrywasnextonthelistat26%,followedbyCryptowall(16%)andLocky(13%).
Interestingly,33%ofrespondentssaidtheyweren’tsurewhatkindofransomwaretheydealtwith.Thisisimportanttonotefortworeasons.First,thetypeofransomwareultimatelydoesn’treallymatter—everytypecanresultinbusinessdowntime.Second,themethodsMSPsusetocombatransomwareandrecoverfollowingattacksarethesameregardlessofthestrain.
D
CommonTypes
EA
ofRansomware
R
0
10
20
30
40
50
60
CryptoLocker
52%
WannaCry
26%
Cryptowall
16%
Locky
13%
Emotet
10%
Petya
7%
CryptXXX
7%
TeslaCrypt
6%
notPetya
5%
TorrentLocker
4%
CBTLocker
3%
CoinVault
3%
CrySis 3%
Wallet 2%
Osiris 2%
Notsurewhattype
33%
*Surveyrespondentswereabletoselectmultipleanswerchoices.
Datto’sGlobalStateoftheChannelRansomwareReport 12
IndustriesMost
IndustriesmostsusceptibletoransomwareduetoCOVID-19:
SusceptibletoRansomware
ThisyearweaskedMSPswhatindustriesweremostsusceptibleto
ransomware
attacksduetoCOVID-19
.Perhapsnotsurprisingly,healthcarewasinthetopspot.59%ofMSPssaidtheybelievedhealthcaretobethemostvulnerable.Hackersarewellknownforstagingattacksagainstvictimsthatarealreadycompromisedinsomeway.So,itmakessensethatcybercriminalswouldgoafterhealthcareorganizationsduringaglobalpandemic.
Finance/insurancewasinthesecondslot(50%)andGovernmentinthird(45%).Theseverticalswerealsoseriouslyimpactedbythepandemicforobviousreasons.Outsideofthetopthree,therestofthelistlooksfairlysimilartopreviousyears’results.
Healthcare
Finance/Insurance
Government
Professional
Services
Education
HighTechnology
Legal
Non-Profit
Energy/
Utilities
Retail
Construction/
Manufacturing
RealEstate
Travel/
Transportation
Telecom
Media/
Entertainment
Consumer
Products
Architecture/Design
Other
0 10 20 30 40 50 60 70
59%
50%
45%
41%
36%
35%
35%
29%
29%
27%
25%
23%
22%
22%
22%
18%
17%
7%
*Surveyrespondentswereabletoselectmultipleanswerchoices.
Datto’sGlobalStateoftheChannelRansomwareReport 13
HackersAren’t
OnlyTargetingSMBs…
95%ofrespondentsagreedthatMSPsarebeingincreasinglytargeted
byransomwareattacks.Thisislikelyduetoanumberofhighprofile
attacksonSMBsin
recentmemory
.Inattackslikethese,hackersuse
MSPcredentialstoaccessandspreadransomwaretotheirclients.In
otherwords,bycompromisinganMSP,cybercriminalsgetmorebangfor
theirbuck.
MSPsaretakingthethreatseriously.Morethanhalfarenowusing
passwordmanagementandmulti-factorauthenticationtools,asyou
willseebelow.
2FAandSSOUse
44%reportedthattheyareusinganidentityproviderforSingleSign-on
(SSO).MicrosoftAzureActiveDirectorywasbyfarthetopchoiceofSSO
identityprovidersamongrespondents.47%ofMSPssaidtheyuseAzure
ADforSSO.Ofthat44%,nearly70%usethesameproviderfortwo-factor
authentication(2FA).
Datto’sGlobalStateoftheChannelRansomwareReport 14
AlmostHalfofMSPsPartnerwithMSSPs
46%ofMSPsnowpartnerwithmanagedsecurityserviceproviders(MSSPs)forassistancewithITsecurity—fortheirclientsandtheirownbusinesses.Infact,thenumberonereasonMSPsreporteddoingsowastoimprovetheirownsecuritypreparedness—anothersignthatMSPsaretakingthepossibilityofattacksontheirownbusinessesseriously.
Ultimately,partneringwithanMSSPboilsdowntoaccessingexpertguidance.ITsecurityisabroad,complexdisciplinewhichrequiresspecializationtodevelopexpertise.MSSPshaveit,andMSPsneedit.
46%ofMSPsnowpartner
withMSSPsforassistance
withITsecurity
MSPsthatpartnerwithMSSPscitedthefollowingreasons:
0 10 20 30 40 50 60
Toboostcybersecurity/
ransomware 54%
preparednessatmyMSP
Toreducecyberrisk
47%
tomybusiness
Tobetterunderstand
availableandeffective 45%
securitytechnologies
Forcybersecurity
45%
solutionsales
Toeducatemystaff
throughexperienceand 35%
exposure
Apathwayto
transformingmyMSPto 23%
anMSSP
Tosharecyberriskwith
22%
anotherorganization
Other 10%
*Surveyrespondentswereabletoselectmultipleanswerchoices.
Datto’sGlobalStateoftheChannelRansomwareReport 15
WindowsEndpointSystemsApplicationsMostTargetedbyHackers
91%ofransomwareattackstargetedWindowsPCsthisyear,accordingtoMSPs.ThistrackswithphishingemailsbeingthenumberoneattackvectorandthesheernumberofWindowsPCsinusetoday.Italsohighlightstheneedforendpointprotectionandbackupsolutions.Ransomwareattacksonthesesystemshaveasignificantimpactonuserproductivity,andinturn,abusiness’abilitytogeneraterevenue.Solutionsthatallowemployeestoreturntoworkquicklyfollowingattacksshouldbeconsideredessential.
WindowsServersfollowedat76%.That’sbecauseransomwaremayenteranetworkviaaphishingemail,butasnotedabove,itdoesn’ttakelongbeforethemalwarespreadsacrossnetworkstoinfectothersystems.Abusinesscontinuitysolutionthatcanrecoverserverworkloadslocallyorinthecloudiscriticaltominimizebusinessinterruptionfollowingaransomwareattack.
Endpointsystemsmosttargetedbyransomwareattacks:
WindowsPCs WindowsServer
91% 76%
WindowsTablet AppleMacOS
8% 7%
Android AppleiOS
6% 4%
*Surveyrespondentswereabletoselectmultipleanswerchoices.
Datto’sGlobalStateoftheChannelRansomwareReport 16
RansomwareCreeps
IntoSaaSApps
Nearly1in4MSPsreportedransomwareattacksonclients’SaaS
applications.Ofthem,Microsoftwashitthehardest.Thisisn’t
particularlysurprising,sincesomanyorganizationsrelyonMicrosoft
Itwassomewhatsurprising,however,toseethatmorethanhalfsawransomwareinDropbox.GoogleWorkspaceroundedoutthetopthreeat25%.
64%
54%
25%
ofMSPsreport
ofMSPsreport
ofMSPsreport
attackswithin
attackswithin
attackswithin
Microsoft365
Dropbox
GoogleWorkspace
HumanErrorHappens:
HowSaaSBackupCanHelp
READ
*Surveyrespondentswereabletoselectmultipleanswerchoices.
Datto’sGlobalStateoftheChannelRansomwareReport 17
MostCommon
Ransomware
RecoveryMethods
Re-imagingamachinefromabackupwasthenumberoneransomware
recoverymethodthisyear.Thisisasignificantchangefromlastyear,
whenre-imagingfromdefaulttookthetopspot.Thisyearthatwasin
thethirdspottiedwithvirtualizingthesystemfromabackupimage.
76%
33%
27%
Restoreamachine
Re-image
Runsoftwareto
fromabackup
fromdefault
cleanupthreat
36%
31%
15%
Restorefromfiles
Virtualizethe
Paidransom
systemfroma
backupimage
*Surveyrespondentswereabletoselectmultipleanswerchoices.
Datto’sGlobalStateoftheChannelRansomwareReport 18
I’mpleasedtoseethat‘re-imagingfrombackup’wasthetopmethodMSPsareusingtorecoverfromransomwareattacks.ThisshowsMSPshavematuredtheirrecoverymethods.Twoyearsago,MSPswerestilldealingwiththeshockofransomware,scramblingtoputsomethinginplaceforrecoveryandlargelyre-imagingmachinesfromscratch.Lastyear,theywereintheprocessofchanginghowtheydothings,puttingtherightsolutionsinplacewiththeircustomerstominimizedowntimeanddataloss.Now,wearestartingtoseeresultsofthoseeffortsmanifestinmorematurerecoverymechanisms.
RyanWeeks
ChiefInformationSecurityOfficer,Datto,Inc.
Datto’sGlobalStateoftheChannelRansomwareReport 19
BCDRClientsAreLessLikelyToExperienceSignificantDowntime
91%
ofMSPssaidclientswithBCDRproductsin
placearelesslikelytoexperiencesignificant
downtimefromransomware.
MostEffectiveSolutionsto
CombatRansomware
Businesscontinuityand
disasterrecovery(BCDR)
Employeetraining
Endpointdetectionand
responseplatform
Patchmanagement
Unifiedthreatmanagement
Identityaccess
managementsolution
Antivirus/Anti-malwaresoftware
Email/Spamfilters
Endpoint/Mobile
managementplatform
Browserisolation
Datto’sGlobalStateoftheChannelRansomwareReport 20
WerequireDattoSIRISasaminimumforallourclientsasoneofthesecurity/continuitylayersweputinplace.Tome,it’sju
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
评论
0/150
提交评论